Blog, news & updates

Webinar: Helping your business stay cyber-secure

Helping your business stay cyber-secure

Our interconnected world makes everyone more susceptible to cyber-attacks, therefore it is important to stay on top of potential threats as well as mitigating any third-party risks to your business. 

Join our free expert led panel on Tuesday 26th July at 2pm with our Cyber Security specialists from iHASCO, QMS and Mitigate, watch them uncover the potential threats of Cyber Security, the key to spotting the signs and assessing the security of your business and how you can implement a unified strategy to protect your business. 

Limited space available on this expert led webinar – be sure to reserve your spot today

Meet the experts

Simon Parker – Simon is an IRCA qualified Lead Auditor specialising in Quality Management and Information Security Standards and Certifications.  He has worked with Information Security Standards for over twenty years, delivering client management systems and audit strategies for information security, business continuity, IT service delivery and related Standards for clients ranging from SMEs to multi-site and international businesses.

Mathew Parry – Mathew is a Data Protection Officer specialising in Risk Management and Information Security Standards and Certifications.  He has worked in the Data Protection and Information Security industry for over ten years, implementing and managing data protection, information security and risk management frameworks across the Public and Private Sector. With clients ranging from Local Government, SMEs and International Businesses in the FinTech industry.

Zain Javed – Co-founder and Chief Technology Officer at Mitigate Cyber, Zain Javed is an entrepreneur and technology professional with over 15 years’ experience in the cyber security industry. With years of experience in training, management, and creating cyber security strategies for organisations worldwide, Zain is the team leader of experts that conduct red team, social engineering, ethical hacking, penetration testing, and vulnerability assessments.